Click here for the Friday Reading Search, a searchable archive of reading and knowledge resources

Since March 2020, Airmic has been issuing Friday Reading, a curated series of readings and knowledge resources sent by email to Airmic members. The objective of Airmic Friday Reading was initially to keep members informed during the Covid-19 pandemic. Today, Airmic Friday Reading has evolved in scope to include content on a wide range of subjects with each email edition following a theme. This page is a searchable archive of all the readings and knowledge resources that have been shared.

To select multiple categories and/or keywords, use Ctrl+Click (or +Click on a Mac).
Airmic,BLM, 8th April 2022
Updated version released April 2022 , covering the latest developments in UK GDPR, including the International data transfer agreement (IDTA) which came into force last month – There are also some very significant GDPR ramifications to this post-Covid new normal. WFH, even if only a part of the post-Covid normal, has rendered many existing security regimes, designed for a pre-pandemic world, redundant.
Categories:
WTW, 31st March 2022
The survey results paint a picture of globalised companies surprised to be caught between geopolitical competitors. In the 2020 survey, the ratio of respondents who declared themselves “concerned” about political risk in the Asia-Pacific region to those who expressed no concern was well below 2:1. In this year’s survey, that ratio nearly reached 20:1.
National Cyber Security Centre (NCSC), 29th March 2022
Cyber security – even in a time of global unrest – remains a balance of different risks. Ian Levy, the NCSC's Technical Director, explains why.
Categories:
Lockton, 28th March 2022
Given the potential for increased cybercrime, it is important to ensure that organizations evaluate their crime policy or policies if they sustain any type of monetary loss from a cyber event. The electronic loss of funds can potentially implicate both cyber and crime policies.
UK National Cyber Security Centre (NSCS), 18th March 2022
Friday Reading Edition 96 (4th March 2022)
The NCSC has urged organisations to follow its guidance on steps to take when the cyber threat is heightened – this guidance encourages organisations to follow actionable steps that reduce the risk of falling victim to an attack.
Categories:
Oliver Wyman, 15th March 2022
Russian state-sponsored actors have demonstrated the capability and willingness to target public and private infrastructure in neighbouring states and beyond. And countless cyber criminals and other opportunists will seek to exploit the fog of war to launch malicious attacks for their own monetary gain. Governments and companies need to be vigilant in tightening their cybersecurity protocols and heightening defences to counter these threats.
Categories:
Oliver Wyman, 4th March 2022
The invasion of Ukraine has triggered a coordinated policy response that will have ramifications across the globe. This note focuses on the implications for the global financial system and the firms, policymakers, and regulators within it.
Lockton, 3rd March 2022
Knowledge of how war exclusions have been interpreted in the past can be useful in evaluating the applicability of the exclusion under the current circumstances around the Ukraine crisis.
KPMG, 1st March 2022
After months and weeks of tension, the Russian government’s invasion of Ukraine has elevated concerns for cyber security incidents and the resilience of critical business functions. While there remains a significant amount of uncertainty around the conflict, including the duration, scale and reach, there are some key considerations that can help to evaluate cyber security preparedness levels.
Categories:
WTW, 24th February 2022
Friday Reading Edition 98 (18th March 2022)
Most, if not all, cyber insurance policies contain a war exclusion of some description. Given the current situation, it is natural that organizations will want to understand how their cyber policy will likely respond in the event of a loss caused by a cyberattack alleged to have been deployed by or on behalf of the Russian state.